Analysis
-
max time kernel
37s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 21:03
Behavioral task
behavioral1
Sample
446f23ae596a3e1c98b29488a6998cc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
446f23ae596a3e1c98b29488a6998cc9.exe
Resource
win10v2004-20231215-en
General
-
Target
446f23ae596a3e1c98b29488a6998cc9.exe
-
Size
11.0MB
-
MD5
446f23ae596a3e1c98b29488a6998cc9
-
SHA1
dcec89d6b554cd7ac2b16aad17b02c6652ffa90e
-
SHA256
5a26556aa9930d210d5df5293b412ac1ea642d09d66f6c027f81278c4a4804ac
-
SHA512
048a0c395ebe9522063a2f4305a8560a4f92c8dbe483a9fc4f20c78809f02dc091c25f808043ff7fe13471bfb141669969ce4656fc3228269787640fdd06e1d2
-
SSDEEP
98304:AU94PfeG6a99wH3U35mCckFR+vicS43mPZE/bAryGvNxxLUhcaeZ35mCckFR+viO:i23BU33FR+6ceBE/oyGBlr33FR+6c
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2736 446f23ae596a3e1c98b29488a6998cc9.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 446f23ae596a3e1c98b29488a6998cc9.exe -
Loads dropped DLL 1 IoCs
pid Process 2680 446f23ae596a3e1c98b29488a6998cc9.exe -
resource yara_rule behavioral1/memory/2680-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x0009000000012266-11.dat upx behavioral1/memory/2736-18-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x0009000000012266-14.dat upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 446f23ae596a3e1c98b29488a6998cc9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 446f23ae596a3e1c98b29488a6998cc9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2680 446f23ae596a3e1c98b29488a6998cc9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2680 446f23ae596a3e1c98b29488a6998cc9.exe 2736 446f23ae596a3e1c98b29488a6998cc9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2736 2680 446f23ae596a3e1c98b29488a6998cc9.exe 30 PID 2680 wrote to memory of 2736 2680 446f23ae596a3e1c98b29488a6998cc9.exe 30 PID 2680 wrote to memory of 2736 2680 446f23ae596a3e1c98b29488a6998cc9.exe 30 PID 2680 wrote to memory of 2736 2680 446f23ae596a3e1c98b29488a6998cc9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\446f23ae596a3e1c98b29488a6998cc9.exe"C:\Users\Admin\AppData\Local\Temp\446f23ae596a3e1c98b29488a6998cc9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\446f23ae596a3e1c98b29488a6998cc9.exeC:\Users\Admin\AppData\Local\Temp\446f23ae596a3e1c98b29488a6998cc9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5e51181fc6d3bde4aa785e3c55f72b35d
SHA1197d2626fc0a9f74eeffe2ef40b4337af71235d6
SHA256ee07325927f0bc47516b6713063d6bd7d081bbca441c159983cdd0a53e7ab900
SHA512edf9709446a0b8ac4c0f26666315b0e80802090121cded9629c8def06679c7bc165375f151009ee6743592438db9615182566056534256d9286f197bc02585d5
-
Filesize
159KB
MD5974f25d758f11853dc84d44e312dfec2
SHA1edbfa5ea9e95fe4387aa9e7eb83ba090db6131ec
SHA256066a08bc8d5bad2b78f456c65717b9614f2915b58f58a8e6e6958c3ab67f5c35
SHA5122c3a3cfaaaadc58bf9c003c7dbb9907a314d01fe6d25114245b5117338ce9b35c0baf689416450c32b9ce207839a49fb4113d9b92de005fedc70a7f3ecee0694